Publications

Export 620 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
Conference Papers
Katz J, Trevisan L.  2000.  On the efficiency of local decoding procedures for error-correcting codes. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :80-86.
Fallah-Adl H, JaJa JF, Liang S, Kaufman YJ, Townshend J.  1995.  Efficient Algorithms for Atmospheric Correction of Remotely Sensed Data. Supercomputing, 1995. Proceedings of the IEEE/ACM SC95 Conference. :12-12.
Tikir MM, Hollingsworth J.  2002.  Efficient instrumentation for code coverage testing. ACM SIGSOFT Software Engineering Notes. 27:86-96.
Heitzmann A, Palazzi B, Papamanthou C, Tamassia R.  2008.  Efficient Integrity Checking of Untrusted Network Storage. StorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability . :43-54.
Tanin E, Nayar D, Samet H.  2005.  An efficient nearest neighbor algorithm for P2P settings. Proceedings of the 2005 national conference on Digital government research. :21-28.
Asgari S, Basili VR, Costa P, Donzelli P, Hochstein L, Lindvall M, Rus I, Shull F, Tvedt R, Zelkowitz MV.  2004.  Empirical-based estimation of the effect on software dependability of a technique for architecture conformance verification. Proceedings of the ICSE 2004 Workshop on Architecting Dependable Systems, Edinburgh, UK.
Ture F, Oard D, Resnik P.  2012.  Encouraging consistent translation choices. Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. :417–426.
Liu M-Y, Tuzel O, Ramalingam S, Chellappa R.  2011.  Entropy rate superpixel segmentation. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :2097-2104.
Naishlos D, Nuzman J, Tseng CW, Vishkin U.  2000.  Evaluating multi-threading in the prototype XMT environment. Proc. 4th Workshop on Multi-Threaded Execution, Architecture and Compliation (MTEAC2000).
Taylor EM, Grube NE, Martin, M.P.  2007.  Evaluation of Traditional and Shock-Confining LES Filters using DNS Data of Compressible Turbulence. Proceedings of 18th AIAA Computational Fluid Dynamics Conference.
Tan L, Cleaveland R.  2002.  Evidence-based model checking. Computer Aided Verification. :641-680.
Basili VR, Costa P, Lindvall M, Mendonca M, Seaman C, Tesoriero R, Zelkowitz MV.  2001.  An experience management system for a software engineering research organization. Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard. :29-35.
Panjwani S, Tan S, Jarrin KM, Cukier M.  2005.  An experimental evaluation to determine if port scans are precursors to an attack. :602-611.
Tsui C-jung, Wang P, Fleischmann KR, Oard D, Sayeed AB.  2010.  Exploring the Relationships among ICTs: A Scalable Computational Approach Using KL Divergence and Hierarchical Clustering. Hawaii International Conference on System Sciences. :1-10.
Taylor M, Yin C-E, M. Wu, Qu G.  2008.  Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems. Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on. :93-96.
Liu M-Y, Tuzel O, Veeraraghavan A, Chellappa R.  2010.  Fast directional chamfer matching. Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. :1696-1703.
Edu CU, Purang K, Purushothaman D, Traum D, Andersen C, Perlis D.  1999.  Fkpurang, darsana, traum, cfa, perlisg@ cs. umd. edu. In Proceedings of the IJCAI’99 Workshop on Practical Reasoning and Rationality.
Tsoumakos D, Roussopoulos N.  2004.  A Framework for Sharing Voluminous Content in P2P Systems. PDPTA. :1031-1036.
Mendonca MG, Maldonado JC, de Oliveira MCF, Carver J, Fabbri CPF, Shull F, Travassos GH, Hohn EN, Basili VR.  2008.  A Framework for Software Engineering Experimental Replications. Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on. :203-212.
Turaga PK, Veeraraghavan A, Chellappa R.  2007.  From Videos to Verbs: Mining Videos for Activities using a Cascade of Dynamical Systems. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Caragea GC, Keceli F, Tzannes A, Vishkin U.  2010.  General-purpose vs. gpu: Comparison of many-cores on irregular workloads. Proceedings of the Second Usenix Workshop on Hot Topics in Parallelism. :14-15.
Chetty M, Tran D, Grinter RE.  2008.  Getting to Green: Understanding Resource Consumption in the Home. UbiComp '08. :242-251.
Thomas J, Dearden A, Dray S, Light A, Best M, Arkin N, Maunder A, Kam M, Chetty M, Sambasivan N et al..  2008.  Hci for community and international development. SIGCHI EA '08. :3909-3912.
Sundaresan S, Feamster N, Teixeira R, Tang A, W. Edwards K, Grinter RE, Chetty M, de Donato W.  2011.  Helping Users Shop for ISPs with Internet Nutrition Labels. ACM SIGCOMM Workshop on Home Networks '11. :13-18.
Sundaresan S, Feamster N, Teixeira R, Tang A, W. Edwards K, Grinter RE, Chetty M, de Donato W.  2011.  Helping Users Shop for ISPs with Internet Nutrition Labels. ACM SIGCOMM Workshop on Home Networks '11. :13-18.

Pages